summaryrefslogtreecommitdiff
path: root/src/lib/libc (unfollow)
Commit message (Collapse)AuthorFilesLines
2023-10-03Fix a typo and move a wordtb1-5/+5
2023-10-02Add some coverage for ASN1_TIME_cmp_time_t() as welltb1-1/+14
ASN1_UTCTIME_cmp_tim_t() could be done similarly, but then I have to mess with LIBRESSL_INTERNAL. Let's do this after unlock.
2023-10-02Add regress coverage for ASN1_TIME_compare()tb1-1/+78
2023-10-02Minor asn1time tweakstb1-26/+12
Sprinkle some (static) const and garbage collect an unused struct.
2023-10-01Example code tweak: do not hardcode the size of arraytb1-2/+2
2023-10-01Fix a copy-paste bug in ASN1_TIME_compare()tb1-2/+2
ASN1_TIME_compare() compares two times t1 and t2. Due to a copy-paste error, we would do ASN1_time_parse(t1->data, t2->length, &tm2, t2->type) Now if t1 is a UTCTime (length 13) and t2 is a GeneralizedTime (length 15), the worst that could happen is a 2-byte out-of-bounds read. Fortunately, t1 will already have parsed as a UTCTime, so it will have a Z where there should be the first digit of the seconds for a GeneralizedTime and we will error out. Now if both t1 and t2 have the same type, we will parse t1's data twice and we will return an incorrect comparison. This could have some security impact if anything relied on this function for security purposes. It is unused in our tree and unused in our ports tree ports and the only consumer I could find was some MongoDB things doing OCSP, so this won't be too bad. Then of course there's also the language bindings. Issue reported by Duncan Thomson at esri dot com via libressl-security ok beck deraadt
2023-10-01Document EVP_CIPHER_CTX_iv_length() return valuestb1-3/+7
We aligned with upstream behavior. Let's document it properly. Surprisingly, OpenSSL 1.1 half-assed the docs: two parts of the manual contradict each other. The part getting EVP_CIPHER_CTX_iv_length() right, incorrectly documents possible -1 return value to EVP_CIPHER_iv_length(). OpenSSL 3 documentation improvement efforts seem to have tried to address this issue with the result that the manual is now entirely wrong when it comes to the EVP_CIPHER_CTX_iv_length() replacement. Par for the course.
2023-10-01The colons separate the octets, not the digits; add missing link totb1-4/+5
crypto(3)
2023-10-01Improve a code comment in the EXAMPLES sectiontb1-3/+3
2023-10-01Refer to RFC 3779, 2.1.2 for encoding of rangestb1-2/+7
Mention sections 2.1.1 and 2.1.2 in STANDARDS
2023-10-01Point out that the result of IPAddressRange_new() is an invalid rangetb1-3/+3
since it should be a prefix.
2023-10-01encoding -> decoding for d2itb1-3/+3
2023-10-01Add an empty linetb1-1/+2
2023-09-30Reorder list of additional validation checks neededtb1-9/+8
2023-09-30Switch copyright year to 2023.tb2-4/+4
Apparently I should have used 2023 despite sharing versions of these files with several people under this license (and thus permitting them to redistribute and share with the public). It makes no sense to me, but shrug.
2023-09-30Use addrblocks for .Fatb1-2/+2
2023-09-30avoid using the string "a" without markup as a placeholderschwarze1-4/+9
where that feels potentially confusing, and add one missing .Pp macro; no change of meaning
2023-09-30consistently use "allow_inherit" for the argument nameschwarze1-6/+6
and fix whitespace on one text line; no change of meaning
2023-09-30drop one pair of needless parenthesesschwarze1-5/+5
and polish one wording; no change of meaning
2023-09-30remove a useless repetition of a function nameschwarze1-6/+4
that was also followed by a bogus argument, and fix one grammatical error; no change of meaning
2023-09-30polish an awkward wordingschwarze1-9/+7
and capitalize "AFI" where is does not refer to the function argument; no change of meaning
2023-09-30two instances of missing .Fa macrosschwarze1-13/+15
and some missing escaping of HYPHEN-MINUS; no text change
2023-09-30fix one copy and paste error: d2i_*() decode rather than encode;schwarze1-7/+7
plus some minor markup and punctuation fixes
2023-09-30garbage collect two stray words, no change of meaningschwarze1-4/+4
2023-09-29Allow IP addresses to be specified in a URI.beck3-19/+70
Our checking here was a bit too aggressive, and did not permit an IP address in a URI. IP's in a URI are allowed for things like CRLdp's AIA, SAN URI's etc.). The check for this was also slightly flawed as we would permit an IP if memory allocation failed while checking for an IP. Correct both issues. ok tb@
2023-09-29Some wording tweaks to make things a bit more precise.tb1-6/+7
2023-09-29Fix a wrong tag and work around an ugly linebreaktb1-5/+6
2023-09-29Document X509v3_{addr,asid}_validate_{path,resource_set}(3)tb6-10/+217
These were the last four RFC 3779 things that check_complete.pl x509v3 complained about. I will surely tweak and try to improve a few things in the coming days, but the pages should now be stable enough that review efforts will likely not be wasted. Any feedback appreciated.
2023-09-29Appease coveritytb1-2/+4
This is a static pointer, so it ain't ever NULL, but shrug
2023-09-28Fix error messagetb1-2/+2
2023-09-28Don't leak ctx on failuretb1-3/+2